Communication method and device

A communication method and network element technology, applied in the field of communication, can solve the problems of incommunicability, poor authentication flexibility, etc., and achieve the effect of improving communication flexibility

Active Publication Date: 2021-11-26
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current GBA-based authentication system and the AKMA-based authentication system are independent of each other and cannot communicate with each other, resulting in poor authentication flexibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and device
  • Communication method and device
  • Communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0186] First, the communication scenarios and some vocabulary involved in the embodiments of the present application are explained.

[0187] The technical solution shown in the embodiment of this application can be applied to the interconnection between the authentication system based on GBA and the authentication system based on AKMA. The interconnection and intercommunication between the system and the 5G system; it can also be applied to the interconnection and intercommunication between other GBA-based authentication systems and AKMA-based authentication systems, which is not limited in this embodiment of the present application.

[0188] figure 1 The architecture diagram of the communication system provided by the embodiment of this application. Such as figure 1 As shown, the communication system in this embodiment of the present application may include a terminal device 101 , a first network 102 and a second network 103 . Of course, the communication system may also i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide a communication method and device, the method comprising: a first network element receives a first request from a terminal device; wherein, the first request includes an identifier of the terminal device; the first network element receives a first request according to The first request sends a second request to a second network element; wherein, the second request includes an identifier of the terminal device; the first network element receives a first shared key from the second network element; Wherein, the first shared key is determined by the second network element according to the second shared key, and the second shared key is determined by the second network element according to the identifier of the terminal device; The first shared key is used for security protection in the first network, and the second shared key is used for security protection in the second network. In the embodiment of the present application, the first authentication architecture and the second authentication architecture can realize intercommunication, which improves communication flexibility.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a communication method and device. Background technique [0002] With the development of communication technologies, the reliability of network services is increasingly required in the communication process. Therefore, operators and users usually need to use authentication mechanisms to ensure the reliability of network services. Specifically, the authentication mechanism may be that two-way authentication is implemented between a user terminal (User Equipment, UE) and an application server through a key or the like. [0003] At present, the authentication methods between the UE and the application server are: the authentication method based on the Generic Bootstrapping Architecture (GBA), which can be applied to the third-generation mobile communication (3fifth-generation, 3G) and the fourth-generation mobile communication (4fifth-generation, 4G); with the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/0431H04W12/06H04L9/32H04L9/08
CPCH04L9/083H04L9/0866H04L9/088H04L9/3273H04L2209/80H04W12/06H04L9/08H04L9/32H04W12/04
Inventor 张博
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products